| Research Article: IJIRCCE |
| OTP Encryption Techniques in Mobiles for
Authentication and Transaction Security |
| Dr.AnanthiShesashaayee, D. Sumathy |
|
|
|
|
| Research Article: IJIRCCE |
| Hot Topics Perception in Social Network |
| Kayalvizhi P, Anoor Selvi C |
|
|
|
|
| Research Article: IJIRCCE |
| Dijkstra?s Shortest Path Algorithm for Road
Network |
| K.Rohila, P.Gouthami, Priya M |
|
|
|
|
| Research Article: IJIRCCE |
| Enhancing the Performance of Mining High
Utility Itemsets Based On Pattern Algorithm |
| Ranjith Kumar. M, kalaivani. A, Dr. Sankar Ram. N |
|
|
|
|
| Research Article: IJIRCCE |
| Designing Of Fast Multipliers with Ancient
Vedic Techniques |
| Jeevitha.R, Jayanthi.P, Gowthami A.K, Uvarajan K.P |
|
|
|
|
| Research Article: IJIRCCE |
| A Neoteric Approaches To Efficient Data
Transmission and Avoid Address Collision in
Wireless Network Interface |
| Ramya Devi.S, Senthil Murugan. N |
|
|
|
|
| Research Article: IJIRCCE |
| To Enhance the Network Lifetime Based On
EDIT Algorithm in Wireless Sensor Networks |
| Suriya Jochi .T, S.Senthil, |
|
|
|
|
| Research Article: IJIRCCE |
| Challenges to Privacy and Risk Oriented
RFID System Implementation in Libraries |
| Nitumika Gogoi |
|
|
|
|
| Research Article: IJIRCCE |
| A Survey of Clustering In Mobile Ad-Hoc
Networks |
| K.Madhu Pavan, Dr.syed umar, P.V.Avinash Reddy, Munnangi.Chandradeep |
|
|
|
|
| Research Article: IJIRCCE |
| A Survey of Associate Access Points to
Increase the Performance of IEEE 802.11
Wirelesses LAN |
| Tipirneni Venkata Satyanarayana, Dr.syed umar, Devagiri Sayee Chaitanya Reddy, Harshad Mahatha.Shaik |
|
|
|
|
| Research Article: IJIRCCE |
| Efficient Content Based Image Retrieval
System in Visual Words, Color and Edge
Directive Descriptors and Fuzzy Color and
Texture Histogram |
| K. Haridas, Dr. Antony SelvadossThanamani |
|
|
|
|
| Research Article: IJIRCCE |
| Comprehensive and Comparative Analysis of
Cryptographic Solutions in Cloud |
| P.Madhubala , Dr.P.Thangaraj |
|
|
|
|
| Research Article: IJIRCCE |
| A Proportional Learning on Sink, Warm Hole
Attacks with Prevention Algorithms in Wireless
Sensor Networks PLSWHA-WSN |
| Savitha Devi.M, Dr.P.ThangaRaj |
|
|
|
|
| Research Article: IJIRCCE |
| Advanced Data Access Scheme in Disruption
Tolerant Network |
| S.Revathi , A.P.V.Raghavendra |
|
|
|
|
| Research Article: IJIRCCE |
| A Survey of Random Routing Protocol for
Load Reduction in MANET's |
| Tipirneni Venkata Satyanarayana, Dr.syed umar, Vunnam Naresh, Pillarisetty vivek |
|
|
|
|
| Research Article: IJIRCCE |
| Advanced Data Access Scheme in Disruption
Tolerant Network |
| S.Revathi , A.P.V.Raghavendra |
|
|
|
|
| Research Article: IJIRCCE |
| A Novel Cloud based Mobile Social TV |
| Srilatha Pavuluri and S.Sravani and Kadiyala Ramana |
|
|
|
|
| Research Article: IJIRCCE |
| Neighbour Position Discovery and Verification
in MANETs |
| S.Feroz Ahammad and M.Vikram and Kadiyala Ramana |
|
|
|
|
| Research Article: IJIRCCE |
| Mitigation of Vampire Attacks in Wireless
Sensor Networks |
| M.Nageswara Prasadhu, D.V.Bharath and G.Lakshmikanth |
|
|
|
|
| Research Article: IJIRCCE |
| Mobile Social TV based on Cloud |
| Rajesh Mallela, K.Rajsekhar Reddy and M.Subba Rao |
|
|
|
|
| Research Article: IJIRCCE |
| The Feasibility of SET-IBS and SET-IBOOS
Protocols in Cluster-Based Wireless Sensor
Network |
| R.Anbarasi, S.Gunasekaran |
|
|
|
|
| Research Article: IJIRCCE |
| A Survey of Cloud Authentication Attacks and
Solution Approaches |
| B.Sumitra, C.R. Pethuru, M.Misbahuddin |
|
|
|
|
| Research Article: IJIRCCE |
| An Efficient Attack Resistance Model Using
Application Based Polynomial Distribution |
| Vince Paul, Dr. K. Prasadh, Jasmy Davies |
|
|
|
|
| Research Article: IJIRCCE |
| Social Networks Privacy-Preserving On
Collaborative Tagging and Spam Filter Using
Naive Bayes Algorithm |
| L.Sundarrajan, S.Gunasekaran |
|
|
|
|
| Research Article: IJIRCCE |
| The Use and Industrial Importance of Virtual
Databases |
| Dr V S Dhaka, Sonali Vyas |
|
|
|
|
| Research Article: IJIRCCE |
| Efficient and Secure Route Discover by Stability
Link Selection of Neighbours in MANET |
| R.Santhosam, A.P.V.Raghavendra |
|
|
|
|
| Research Article: IJIRCCE |
| A Survey of Web Image Search and Re-
Ranking Technique |
| B. Steffi Graph, M. Ramesh |
|
|
|
|
| Research Article: IJIRCCE |
| Responsive Communication Jamming
Detector with Noise Power Fluctuation using
Cognitive Radio |
| Mohsen M. Tanatwy |
|
|
|
|
| Research Article: IJIRCCE |
| Impact of Using G.729 on the Voice over LTE
Performance |
| Younes LABYAD, Mohammed MOUGHIT1, 2, Abderrahim Marzouk1, Abdelkrim HAQIQ1, 3 |
|
|
|
|
| Research Article: IJIRCCE |
| DC Chopping for High Power Application |
| D.Pavithra , K.C.Anandhan |
|
|
|
|
| Research Article: IJIRCCE |
| Certain Investigations on Strategies for
Protecting Medical Data in Cloud |
| V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa |
|
|
|
|
| Research Article: IJIRCCE |
| Investigations on Evolution of Strategies to
Preserve Privacy of Moving Data Objects |
| P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa |
|
|
|
|
| Research Article: IJIRCCE |
| Certain Investigations on Securing Moving
Data Objects |
| P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa |
|
|
|
|
| Research Article: IJIRCCE |
| A Novel Technique for Detection of CVSD
Encoded Bit Stream |
| Parthraj Tripathi, Dr.K.Padma Raju, V.Ravi Chandra |
|
|
|
|
| Research Article: IJIRCCE |
| Investigations on Remote Virtual Machine to
Secure Lifetime PHR in Cloud |
| V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa |
|
|
|
|
| Research Article: IJIRCCE |
| Protection of Smartphone, Personal
Computer and Other Similar Devices from
Virus Infections |
| Sudhakar Singh, P.K. Khare, J.M. Keller, P. Mor, M.K. Pathak |
|
|
|
|
| Research Article: IJIRCCE |
| A Data Mining Model to Read and Classify
Your Employees? Attitude |
| J John Victor Antony, G M Nasira |
|
|
|
|
| Research Article: IJIRCCE |
| Incremental Violation Detection of
Inconsistencies in Distributed Cloud Data |
| S. Anantha Arulmary, N.S. Usha |
|
|
|
|
| Research Article: IJIRCCE |
| Link Quality Aware Wireless Sensor
Networks Using Adaptive Code Dissemination
Protocol |
| C. Bhuvaneswari, Ellcy Priana |
|
|
|
|
| Research Article: IJIRCCE |
| Improving Ad Hoc Network Behaviour Using
Clustering T echnique with NS2 |
| GhaidaaMuttasher Abdulsahib, Norrozila Sulaiman, Osamah Ibrahem Khalaf, |
|
|
|
|
| Research Article: IJIRCCE |
| Stress causing Arrhythmia Detection from
ECG Signal using HMM |
| K.Vimala |
|
|
|
|
| Research Article: IJIRCCE |
| A Survey of Frequent and Infrequent
Weighted Itemset Mining Approaches |
| J.Jaya, S.V.Hemalatha |
|
|
|
|
| Research Article: IJIRCCE |
| Spectral Response of FWM in EDFA for
Long-haul Optical Communication |
| Lekshmi.S.R, Sindhu.N |
|
|
|
|
| Research Article: IJIRCCE |
| A Survey on Detection of Mining Service
Information Discovery Using SASF Crawler |
| R.Eswaramoorthy, M.Jayanthi |
|
|
|
|
| Research Article: IJIRCCE |
| A Survey on Delegated Access Control in
Public Cloud |
| V.Karthik, K.S.Arvind |
|
|
|
|
| Research Article: IJIRCCE |
| A Study on Unidentified Routing Protocols in
MANETs |
| N.Saravana Selvam, R.T.Nivetha, S.S.Nevatha |
|
|
|
|
| Research Article: IJIRCCE |
| A Study of Information Extraction Tools for
Online English Newspapers (PDF):
Comparative Analysis |
| M. Hanumanthappa, Deepa T. Nagalavi, Manish Kumar |
|
|
|
|
| Research Article: IJIRCCE |
| A Recent Improvements in Quantum Model
and Counter Measures in Quantum
Computing |
| J.Senthil Murugan, V.Parthasarathy , S.Sathya, M.Anand |
|
|
|
|
| Research Article: IJIRCCE |
| Stateless Routing for Wireless Networks Using
Ravenous Perimeter |
| Anwar Ahsan, U T Nagdeve |
|
|
|
|
| Research Article: IJIRCCE |
| Big Data Analytics Security Issues in Data
Driven Information System |
| M. Chithik Raja, Munir Ahmed Rabbani |
|
|
|
|
| Research Article: IJIRCCE |
| Improvement of Energy Efficiency in Wireless
Sensor Network Using Intelligent Water Drop |
| Harshwinder Singh, Navpreet Kaur Walia |
|
|
|
|